WO2012129409A2 - Strong rights management for computing application functionality - Google Patents
Strong rights management for computing application functionality Download PDFInfo
- Publication number
- WO2012129409A2 WO2012129409A2 PCT/US2012/030130 US2012030130W WO2012129409A2 WO 2012129409 A2 WO2012129409 A2 WO 2012129409A2 US 2012030130 W US2012030130 W US 2012030130W WO 2012129409 A2 WO2012129409 A2 WO 2012129409A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- access
- functionality
- virtual
- user
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims description 74
- 238000000034 method Methods 0.000 claims description 46
- 230000004044 response Effects 0.000 claims description 9
- 238000012790 confirmation Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 abstract description 6
- 238000007726 management method Methods 0.000 description 22
- 230000004913 activation Effects 0.000 description 13
- 238000012545 processing Methods 0.000 description 11
- 230000009471 action Effects 0.000 description 10
- 238000012360 testing method Methods 0.000 description 9
- 238000011161 development Methods 0.000 description 8
- 230000015654 memory Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000004519 manufacturing process Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000009849 deactivation Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 238000013515 script Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000003936 working memory Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 238000011282 treatment Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Definitions
- computing devices From data processing and engineering to education and entertainment, computing devices have found a wide variety of applications in modern homes, schools and workplaces. Many such computing devices include processors capable of executing instructions (e.g., instructions corresponding to elements of a computer programming language), and much of the functionality of a computing device may be controlled by a set of executable instructions and, optionally, a set of configuration data (e.g., by a computer program). Development of a computer program for a particular application and/or set of functionality can require a significant investment of time and resources. For example, years of effort by teams of dozens of people is not uncommon.
- executable instructions and configuration data can have a digital representation (e.g., an application “executable” or “binary”) that is easily copied, and illegal and/or uncompensated use of enabled functionality (e.g., application “piracy”) is a significant problem.
- Such physical access can enable the user to obtain corresponding decrypted and/or unlocked portions, or otherwise circumvent the need to obtain a legitimate key.
- Such physical access may also enable the user to emulate, or otherwise circumvent the need for, a remote authentication server and/or a local dongle.
- Remote access to low-level computing device functionality e.g., operating system-level functionality
- access to low-level functionality of a communication network connected to the computing device e.g., access to in-transit data packet "sniffing"
- Figure 1 is a schematic diagram illustrating an example environment for implementing aspects in accordance with at least one embodiment
- Figure 2 is a schematic diagram depicting aspects of an example virtual resource provisioning architecture in accordance with at least one embodiment
- Figure 3 is a schematic diagram depicting aspects of an example virtual resource provider in accordance with at least one embodiment
- Figure 4 is a schematic diagram depicting aspects of an example control plane in accordance with at least one embodiment
- Figure 5 is a flowchart depicting example steps for making an application appliance available at a virtual resource provider in accordance with at least one embodiment
- Figure 6 is a flowchart depicting example steps for accessing application appliance functionality in accordance with at least one embodiment.
- Figure 7 is a flowchart depicting example steps for dynamic feature activation in accordance with at least one embodiment
- Figure 8 is a flowchart depicting example steps for workflow management in accordance with at least one embodiment.
- the virtual resource provider may provision the virtual machines and other virtual resources with a managed set of implementation resources such as physical servers, physical network switches and physical network paths.
- the provisioning, including allocation and ongoing reallocation of the implementation resources, may be managed by a control plane of the virtual resource provider.
- the control plane may perform a number of control functions for the virtual resource provider including management and enforcement of virtual resource access policies.
- the virtual resource provider may provision the set of virtual machines and a set of communication connections enabling communication with the set of virtual machines.
- the set of virtual resource access policies enforced by the control plane of the virtual resource provider may include one or more policies collectively specifying that the provisioned set of virtual machines executing the executable instructions that implement the computing application functionality are to be accessed with the provisioned set of communication connections (the "allowed" set of communication connections), and no others.
- a communication protocol allows specification of a communication port or a sub-address or the like, such policies may specify the allowed communication connections to a finest level of granularity.
- the set of virtual resource access policies may further include one or more policies collectively specifying that the computing application functionality is to be accessed in accordance with a license or agreement between a third party provider or vendor of the computing application functionality and a user of the computing application functionality.
- the allowed set of communication connections corresponds to communication connections between virtual machines provisioned by the virtual resource provider.
- the allowed set of communication connections may be between the provisioned set of virtual machines executing the executable instructions that implement the computing application functionality (the "application appliance") and one or more virtual machines provisioned by the virtual resource provider at which a user account and work environment is maintained by an operating system (one or more "user VMs").
- the allowed set of communication connections may include communication connections between the application appliance and one or more virtual machines and/or computing devices not provisioned by the virtual resource provider, and participating in a virtual private computing cloud (VPC) maintained by the virtual resource provider such that the control plane may enforce access policies with respect to the application appliance and/or the allowed set of communication connections.
- VPC virtual private computing cloud
- FIG. 1 illustrates aspects of an example environment 100 for implementing aspects in accordance with various embodiments.
- a Web-based environment may be utilized for purposes of explanation, different environments may be utilized, as appropriate, to implement various embodiments.
- the environment 100 shown includes both a testing or a development portion (or side) and a production portion.
- the production portion includes an electronic client device 102, which may include any appropriate device operable to send and receive requests, messages, or information over an appropriate network 104 and convey information back to a user of the device 102.
- client devices include personal computers, cell phones, handheld messaging devices, laptop computers, tablet computers, set-top boxes, personal data assistants, electronic book readers, and the like.
- the network 104 may include any appropriate network, including an intranet, the Internet, a cellular network, a local area network, a wide area network, a wireless data network, or any other such network or combination thereof. Components utilized for such a system may depend at least in part upon the type of network and/or environment selected. Protocols and components for communicating via such a network are well known and will not be discussed herein in detail. Communication over the network may be enabled by wired or wireless connections, and combinations thereof.
- the network 104 includes the Internet, as the environment includes a Web server 106 for receiving requests and serving content in response thereto, although for other networks an alternative device serving a similar purpose could be utilized as would be apparent to one of ordinary skill in the art.
- the illustrative environment 100 includes at least one application server 108 and a data store 110. It should be understood that there may be several application servers, layers, or other elements, processes, or components, which may be chained or otherwise configured, which may interact to perform tasks such as obtaining data from an appropriate data store.
- data store refers to any device or combination of devices capable of storing, accessing, and/or retrieving data, which may include any combination and number of data servers, databases, data storage devices, and data storage media, in any standard, distributed, or clustered environment.
- the application server 108 may include any appropriate hardware and software for integrating with the data store as needed to execute aspects of one or more applications for the client device 102, and may even handle a majority of the data access and business logic for an application.
- the application server 108 provides access control services in cooperation with the data store 110, and is able to generate content such as text, graphics, audio, and/or video to be transferred to the user, which may be served to the user by the Web server 106 in the form of HTML, XML, or another appropriate structured language in this example.
- the handling of all requests and responses, as well as the delivery of content between the client device 102 and the application server 108, may be handled by the Web server 106.
- the Web and application servers 106, 108 are not required and are merely example components, as structured code discussed herein may be executed on any appropriate device or host machine as discussed elsewhere herein.
- the environment 100 may be architected in such a way that a test automation framework may be provided as a service to which a user or application may subscribe.
- a test automation framework may be provided as an implementation of any of the various testing patterns discussed herein, although various other implementations may be utilized as well, as discussed or suggested herein.
- the environment 100 may also include a development and/or testing side, which includes a user device 118 allowing a user such as a developer, data administrator, or tester to access the system.
- the user device 118 may be any appropriate device or machine, such as is described above with respect to the client device 102.
- the environment 100 may also include a development server 120, which functions similar to the application server 108 but typically runs code during development and testing before the code is deployed and executed on the production side and becomes accessible to outside users, for example.
- an application server may function as a development server, and separate production and testing storage may not be utilized.
- the data store 110 may include several separate data tables, databases, or other data storage mechanisms and media for storing data relating to a particular aspect.
- the data store 110 illustrated includes mechanisms for storing production data 112 and user information 116, which may be utilized to serve content for the production side.
- the data store 110 also is shown to include a mechanism for storing testing data 114, which may be utilized with the user information for the testing side. It should be understood that there may be many other aspects that are stored in the data store 110, such as for page image information and access right information, which may be stored in any of the above listed mechanisms as appropriate or in additional mechanisms in the data store 110.
- the data store 110 is operable, through logic associated therewith, to receive instructions from the application server 108 or development server 120, and obtain, update, or otherwise process data in response thereto.
- a user might submit a search request for a certain type of item.
- the data store 110 might access the user information 116 to verify the identity of the user, and may access the catalog detail information to obtain information about items of that type.
- the information then may be returned to the user, such as in a results listing on a Web page that the user is able to view via a browser on the user device 102. Information for a particular item of interest may be viewed in a dedicated page or window of the browser.
- Each server typically will include an operating system that provides executable program instructions for the general administration and operation of that server, and typically will include a computer-readable medium storing instructions that, when executed by a processor of the server, allow the server to perform its intended functions.
- Suitable implementations for the operating system and general functionality of the servers are known or commercially available, and are readily implemented by persons having ordinary skill in the art, particularly in light of the disclosure herein.
- the environment 100 in one embodiment is a distributed computing environment utilizing several computer systems and components that are interconnected via communication links, using one or more computer networks or direct connections.
- the environment 100 in one embodiment is a distributed computing environment utilizing several computer systems and components that are interconnected via communication links, using one or more computer networks or direct connections.
- such a system could operate equally well in a system having fewer or a greater number of components than are illustrated in Figure 1.
- the depiction of the system 100 in Figure 1 should be taken as being illustrative in nature, and not limiting to the scope of the disclosure.
- one or more aspects of the environment 100 may incorporate and/or be incorporated into a virtual resource provisioning architecture.
- Figure 2 depicts aspects of an example virtual resource provisioning architecture 200 in accordance with at least one embodiment.
- the example virtual resource provisioning architecture 200 includes multiple clients 202-204 communicatively connected to a virtual resource provider 206 over a network 208.
- the clients 202-204 may correspond to computing devices such as the computing device 102 of Figure 1 and/or client programs incorporated into such computing devices.
- the ellipsis between the client 202 and the client 204 indicates that the virtual resource provisioning architecture 200 may include any suitable number of clients although, for clarity, only two are shown in Figure 2. Ellipses are used similarly throughout the drawings.
- One or more of the clients 202-204 may be utilized by one or more authorized users associated with a tenant of the virtual resource provider 206 to interact with a control plane 210 of the virtual resource provider 206, and thereby provision one or more virtual computing resources 212.
- one or more of the clients 202-204 may be utilized to interact with provisioned virtual computing resources 212.
- the provisioned virtual computing resources 212 may include any suitable type and/or number of virtual resources 214-216.
- suitable virtual resources 214-216 include virtual machines such as virtual computer systems (VCSs), virtual networks, virtual private networks (VPNs), virtual network connections, virtual data stores, virtual file system volumes, specialized data processing agents, media streaming agents including audio and video streaming agents, message queues, publish-subscribe topics configured to notify subscribers having subscriptions that match events published to the publish-subscribe topics, monitoring agents, load balancing agents, and suitable combinations thereof.
- VCSs virtual computer systems
- VPNs virtual private networks
- media streaming agents including audio and video streaming agents
- message queues publish-subscribe topics configured to notify subscribers having subscriptions that match events published to the publish-subscribe topics, monitoring agents, load balancing agents, and suitable combinations thereof.
- the virtual resource provider 206 may further include any suitable type and/or number of implementation resources 218.
- Each of the provisioned computing resources 212 may be implemented by a set of the implementation resources 218.
- various implementation resources of the implementation resources 218 may be configured to participate in implementing, at least in part, multiple of the provisioned computing resources 212.
- suitable implementation resources 218 include VCS servers, data store servers, computers, server racks, networking hardware including switches, routers, gateways, bridges, hubs, repeaters, firewalls and wireless transceivers, power supplies, generators, data centers, rooms in data centers, mobile data centers, as well as nonvolatile storage devices including hard drives, processing units such as central processing units (CPUs), caches in processing units, processing cores in multi-core processing units, volatile storage devices such as memory modules including random access memory (RAM) modules, and RAM chips of multi-chip memory modules, network interface hardware and suitable combinations thereof.
- VCS servers data store servers, computers, server racks, networking hardware including switches, routers, gateways, bridges, hubs, repeaters, firewalls and wireless transceivers, power supplies, generators, data centers, rooms in data centers, mobile data centers, as well as nonvolatile storage devices including hard drives, processing
- one or more types of provisioned computing resource 212 are implemented by default with a set of implementation resources having a standardized set of implementation resource capacities (e.g., a standardized amount of volatile and/or non-volatile storage). Different implementation resource capacities may be provisioned for such computing resources 212. For example, such computing resources 212 may be provisioned with implementation resources collectively having a set of implementation resource capacities one or more of which is a multiple of a corresponding implementation resource capacity in the standardized set.
- a virtual computer system with 1 gigabyte of available RAM corresponds to a "small" size.
- Virtual computer systems with "medium” and “large” sizes, corresponding to 2 gigabytes and 4 gigabytes of RAM, respectively, may be requested, for example.
- Provisioned computing resources 212 with larger "sizes" may have commensurately higher associated costs.
- the provisioned virtual computing resources 212 may further include any suitable type and/or number of application appliances 220-222.
- an application appliance may configure a set of one or more virtual resources (e.g., corresponding to the virtual resources 214-216) and/or the implementation resources 218 to provide a set of computing application functionality.
- Application appliances 220-222 may be provisioned in a manner corresponding to that of provisioning the virtual resources 214- 216.
- application appliances 220-222 are located in an application vendor space 224 distinct from a general user space 226 of the provisioned computing resources 212. Location in different provisioned computing resource spaces 224-226 may correspond to different access policy and/or cost accounting treatments reflecting different roles with respect to the virtual resource provider 206.
- virtual resources 214-216 provisioned in the general user space 226 may facilitate a business end-use of a tenant.
- application appliances 220-222 may be offered by third party vendors to provide a set of computing application functionality.
- Access policies associated with virtual resources 214-216 in the general user space 226 may allow access from public networks.
- access policies associated with application appliances 220-222 may restrict access to other provisioned computing resources 212 or to a particular subset of the virtual resources 214-216 such as a particular set of user VMs and/or communication connections.
- Costs associated with virtual resources 214-216 in the general user space 226 may be determined based at least in part on allocated implementation resources 218.
- costs associated with application appliances 220- 222 may be determined based at least in part on a flat fee, a fee per suitable unit of time, associated implementation resource 218 costs plus a surcharge, feature usage, and/or any suitable cost accounting method.
- the control plane 210 may provision computing resources 212 with implementation resources 218 responsive to provisioning requests.
- the control plane 210 may further manage and enforce policies that control access to the provisioned computing resources, including one or more policies that define and/or maintain the application vendor space 224 distinct from the general user space 226.
- the control plane 210 may further track costs associated with maintaining the provisioned computing resources 212 and allocate the costs as appropriate to tenant accounts.
- An example control plane in accordance with at least one embodiment is described below in more detail with reference to Figure 4.
- FIG. 3 depicts an example virtual resource provider 302 in accordance with at least one embodiment.
- the example virtual resource provider 302 of Figure 3 includes a control plane 304, a general user space 306 and an application vendor space 308 corresponding to the control plane 210, the general user space 226 and the application vendor space 224 of Figure 2.
- the general user space 306 of Figure 3 contains multiple virtual machines 310-314 communicatively connected to multiple application appliances 316-320 with multiple provisioned communication connections 322-324.
- the virtual machines 310- 314 may be user VMs, and the application appliances 316-320 may correspond to the application appliances 220-222 of Figure 2.
- user control over application appliances 316-320 is at a reduced level relative to the virtual machines 310-314.
- user control over the application appliances 316-320 may be limited to starting, suspending and terminating the application appliances 316-320.
- authorized users may be able to comprehensively configure and login to the virtual machines 310-314.
- the general user space 306 and the application vendor space 308 are separated by a communicative barrier 326 to indicate that ad hoc and/or noncompliant communication connections between the virtual machines 310- 314 and the application appliances 316-320 are prevented by one or more policies enforced by the control plane 304.
- One or more of the virtual machines 310-314 may be connected to one or more of the application appliances 316-320 with policy-complaint communication connections 322-324.
- the virtual machine 314 is connected to the application appliance 320 with policy-compliant communication connection 322.
- the set 326 of virtual machines 310-312 are connected to the set of application appliances 316-318 with policy-compliant communication connection 324.
- the policy-compliant communication connections 322-324 are depicted as passing through the control plane 304 to indicate the ability of the control plane 304 to enforce associated access policies.
- the policy-compliant communication connections 322-324 may be maintained with any suitable communication media and/or communication protocol.
- the policy- compliant communication connections 322-324 may be maintained with a communication protocol in accordance with a transmission control protocol and/or an internet protocol (e.g., TCP/IP).
- TCP/IP internet protocol
- Each virtual machine 310-314 and/or application appliance 316-320 may be associated with a communication protocol address and/or communication port and, for example, the access policy set associated with the communication connection 322 may specify that a destination of protocol messages conveyed through the communication connection 322 correspond to a particular communication protocol address and a particular communication port.
- the application appliances 316-320 may incorporate and/or provide one or more interfaces 328-332 to the computing application functionality, and, for example, the access policy set may specify that protocol messages conveyed through the communication connection 322 be in accordance with and/or directed to one or more elements of the interface 332 (e.g., a selected subset of such interface elements).
- the interfaces 328-332 may include any suitable interface elements such as interface elements corresponding to functionality, or sets of functionality, of the computing application.
- the interfaces 328-332 may incorporate and/or be incorporated in a user interface (UI) such as a graphical user interface (GUI), a Web-based interface, a programmatic interface such as an application programming interface (API) and/or a set of remote procedure calls (RPCs) corresponding to provisioning interface elements, a messaging interface such as a messaging interface in which the interface elements of the interfaces 328-332 correspond to messages of a communication protocol, a remote desktop protocol such as a remote framebuffer protocol (e.g., RFB) or an "X WINDOW SYSTEM" protocol as described in Scheifler et al., "The X Window System," ACM Transactions on Graphics, April 1986, pages 79-109, and/or any suitable combination thereof.
- UI user interface
- GUI graphical user interface
- API application programming interface
- RPCs remote procedure calls
- Web-based interfaces may include Web services interfaces such as Representational State Transfer (REST) compliant (“RESTful”) Web services interfaces or Simple Object Access Protocol (SOAP) compliant Web services interfaces or other "non-RESTful” Web services interfaces.
- REST Representational State Transfer
- SOAP Simple Object Access Protocol
- FIG 4 depicts aspects of an example control plane 402 in accordance with at least one embodiment.
- the control plane 402 may include a user interface (I/F) 404 enabling authorized users to access control plane 402 functionality, and an application vendor interface (I/F) 406 enabling an application vendor to manage a set of application appliances (e.g., application appliances 316-320 of Figure 3) offered by the application vendor.
- the user interface 404 and the application vendor interface 406 may incorporate and/or be incorporated in any suitable type of functionality interface (e.g., as described for interfaces 328-332 of Figure 3).
- the virtual resource provider 302 ( Figure 3) incorporating the control plane 402 may have multiple tenants responsible for costs associated with computing resources 212 ( Figure 2) provisioned by tenant- authorized users.
- An administrative user designated by a tenant may interact with the user interface 404 to manage different types of users associated with the tenant, including users authorized to incur costs, for example, by provisioning computing resources 212.
- Authorized users may interact with the user interface 404 to provision computing resources 212, and manage (e.g., view, label, allocate, route and discharge) associated costs.
- An application vendor may also be a tenant of the virtual resource provider 302 ( Figure 3), although this is not necessary in each embodiment.
- the application vendor may interact with the application vendor interface 406 to configure and/or register application appliances (such as the application appliances 316-320 of Figure 3) as available for provisioning, as well as specify license conditions, configure associated cost plans and manage associated costs.
- the license conditions may include any suitable conditions with respect to access of the computing application functionality such as that a valid and unexpired license exist, that no more than a maximum number of users has accessed the computing application functionality or some specified portion thereof, that no more than a maximum number of concurrent users is accessing the computing application functionality or some specified portion thereof, that the computing application functionality or some specified portion thereof has been accessed no more than a threshold number of times, and the like.
- the application vendor may be responsible to the virtual resource provider 302 for costs incurred by provisioned instances of application appliances offered by the application vendor.
- the associated cost plan may specify that the provisioning tenant is responsible for associated costs, and fees paid by the provisioning tenant may be allocated between the application vendor and the virtual resource provider in accordance with an agreement between them.
- a provisioning component 408 of the control plane 402 may provision computing resources 212 ( Figure 2) responsive to provisioning requests, for example, received from the user interface 404.
- the provisioning component 408 may determine types and capacities of implementation resources 218 required to implement particular provisioned computing resources 212 and allocate available such implementation resources to the task of implementing virtual resources 214-216 and/or application appliances 220-222, as well as ongoing re-allocation of implementation resources 212, for example, to increase utilization efficiency and/or to lower a chance of provisioned resource failure due to implementation resource failure.
- a policy enforcement component 410 of the control plane 402 may manage and enforce virtual resource provider 206 ( Figure 2) policies.
- the policy enforcement component 410 may receive policies to be enforced from an authorized user through the user interface 404, policies with respect to a particular provisioned resource may be established at the policy enforcement component 410 during provisioning, policies may be established at the policy enforcement component 410 by an administrator of the virtual resource provider 206, and/or policies (e.g., cryptographically signed policies) may be received along with provisioned resource 212 access and/or interaction requests from clients 202-204.
- Virtual resource provider 206 policies may govern any suitable aspect of virtual resource provider 206 functionality including functionality provided by provisioned resources 212. Particular sets and/or subsets of functionality provided by provisioned resources 212 may be named, labeled and/or addressable.
- Each such set and/or subset may be individually governed with virtual resource provider 206 policies.
- Such governance may include constraint with respect to implementation resource allocation and utilization, as well as access by users and transfer of data to and from particular provisioned resources 212.
- Users of provisioned resources 212 may include client 202-204 users including anonymous users, virtual resource provider 206 users including administrative users, and virtual resource provider 206 components including implementation resources 218, provisioned resources 212, and control plane 402 components 404-416.
- a virtual resource provider 206 ( Figure 2) policy may specify any suitable set of conditions to be satisfied. For example, the policy may specify conditions under which access to a particular application appliance is permitted.
- Condition parameters may include any suitable data available to the virtual resource provider 206.
- Condition parameter examples include environmental data such as calendar date and time of day, and request-associated data such as originating network address, originating geographical location, originating political and/or administrative division and communication protocol employed.
- a cost-tracking component 412 of the control plane 402 may track costs (e.g., computation and/or financial costs) associated with provisioning and/or maintaining the computing resources 212 ( Figure 2). Costs may be allocated to accounts including tenant accounts. For example, costs associated with computing resources 212 provisioned by one or more users associated with a particular tenant may be allocated to the tenant's account.
- a tenant account and/or one or more of the provisioned resources 212 may be associated with one or more cost plans, and the costs allocated to the tenant account may be determined in accordance with the cost plan(s).
- a cost plan may specify costs as flat fees and/or based on any suitable metric.
- the cost plan may specify costs based on a number of units of time that a particular provisioned resource 212 is available to at least one user associated with the tenant, a number of units of time that a particular implementation resource 218 is allocated to maintaining provisioned resources 212 associated with the tenant, a number of uses of a particular set of features of a particular provisioned resource 212, and/or suitable combinations thereof.
- the cost plan may specify a cost accounting relationship with the tenant including cost pass-through, cost plus a surcharge, flat fee, periodic access fee, feature access fee, activation and deactivation fees, independent billing, and suitable combinations thereof.
- An application rights management (ARM) component 414 of the control plane 402 may act to establish and maintain user and vendor rights with respect to provisioned application appliances 220-222 ( Figure 2).
- the application rights management component 414 may provide and/or establish virtual resource provider 206 policies that control access to executable instructions that implement functionality of the provisioned application appliances 220-222.
- the application rights management component 414 may further facilitate activation and/or deactivation of sets of application functionality and/or application features.
- the application rights management component 414 may notify application appliances 220-222 of user requests to activate and/or deactivate application features, and modify virtual resource provider 206 policies and/or cost plans responsive to activation status updates received from application appliances 220-222.
- the control plane 402 may further include a workflow component 416 configured at least to establish and maintain workflows such as provisioned resource workflows, provisioning workflows and/or policy enforcement workflows established by provisioned resources 212 ( Figure 2), the provisioning component 408 and the policy enforcement component 410, respectively.
- Workflows may include one or more sequences of tasks to be executed to perform a job, such as virtual resource configuration, provisioning or policy management.
- a workflow as the term is used herein, is not the tasks themselves, but a task control structure that may control flow of information to and from tasks, as well as the order of execution of the tasks it controls.
- a workflow may be considered a state machine that can manage and return the state of a process at any time during execution.
- Workflows may be created from workflow templates.
- a policy enforcement workflow may be created from a policy enforcement workflow template configured with parameters by the policy enforcement component 410.
- the workflow component 416 may modify, further specify and/or further configure established workflows.
- the workflow component 416 may select particular implementation resources of the virtual resource provider 206 ( Figure 2) to execute and/or be assigned to particular tasks. Such selection may be based at least in part on the computing resource needs of the particular task as assessed by the workflow component 416.
- the workflow component 416 may add additional and/or duplicate tasks to an established workflow and/or reconfigure information flow between tasks in the established workflow.
- modification of established workflows may be based at least in part on an execution efficiency analysis by the workflow component 416. For example, some tasks may be efficiently performed in parallel, while other tasks depend on the successful completion of previous tasks.
- the control plane 402 may be implemented with a set of provisioned resources 212 ( Figure 2), a set of implementation resources 218 and/or corresponding computing resources.
- Each of the implementation resources 218 may be controlled by the control plane 210.
- each implementation resource may participate in and/or incorporate a portion, agent and/or component of the control plane 210.
- Each of the provisioned resources 212 may be controlled by the control plane 210.
- each provisioned resource may participate in and/or incorporate a portion, agent and/or component of the control plane 210.
- the control plane 210 may be distributed throughout the implementation resources 218 and/or the provisioned resources 212.
- the control plane 210 may be implemented with distributed computing techniques well known to those of skill in the art.
- Figure 5 depicts example steps for making an application appliance available at a virtual resource provider in accordance with at least one embodiment.
- a prototype application appliance may be configured.
- An authorized user of a third party application vendor may provision a virtual machine at the virtual resource provider 206 ( Figure 2) and configure the virtual machine to execute instructions that implement a desired set of computing application functionality.
- the virtual machine may be a virtual computer system incorporating a computer operating system, and the authorized user may install and configure one or more application modules into the virtual computer system and/or the computer operating system.
- the virtual machine may incorporate the desired set of computing application functionality independent of a computer operating system.
- the prototype application appliance may be packaged into a form suitable for provisioning.
- the authorized user may request that the virtual resource provider 206 ( Figure 2) create the provisionable package from the prototype configured at step 502.
- the user interface 404 and/or the application vendor interface 406 may include one or more interface elements enabling the authorized user to make such requests.
- the packaged prototype may be submitted to and/or registered with the virtual resource provider 206.
- the application vendor interface 406 make include one or more interface elements enabling such submissions and/or registrations. Step 506 may be incorporated into step 504.
- one or more application appliance feature costs may be specified.
- the authorized user may interact with one or more interface elements of the application vendor interface 406 ( Figure 4) to specify a cost plan for users of the application appliance.
- Costs associated with access to basic features may be specified, as well as costs associated with each of a set of non-basic and/or premium features.
- Application-specific feature codes may be associated with human-readable names, short descriptions and/or long descriptions.
- a request may be made to make the application appliance available for provisioning.
- the authorized user may submit the request with one or more interface elements of the application vendor interface 406.
- the submitted and/or registered application appliance prototype may be verified.
- the application rights management component 414 ( Figure 4) may verify a static and/or dynamic integrity of the application appliance prototype including with respect to security. If the application appliance is verified, then at step 516 it may be made available for provisioning by authorized users of tenants of the virtual resource provider 206 ( Figure 2). Otherwise, one or more problems that occurred during verification may be reported to the vendor at step 514.
- Figure 6 depicts example steps for accessing application appliance functionality in accordance with at least one embodiment.
- a request to provision a user VM may be received.
- an authorized user associated with a tenant of the virtual resource provider 206 may submit a provisioning request with the user interface component 404 ( Figure 4) of the control plane 402.
- the requested user VM may be provisioned.
- the provisioning component 408 may provision the requested virtual machine 314 in the general user space 306 ( Figure 3).
- the requested virtual machine 314 may be a virtual computer system incorporating a computer operating system.
- a request to provision an application appliance may be received.
- the authorized user may submit another provisioning request with the user interface component 404 ( Figure 4).
- the authorized user need not be aware of how the computing application functionality associated with the application appliance is implemented.
- the authorized user need not be aware that an application appliance instance is provisioned to implement the computing application functionality.
- the authorized user may request that the computing application functionality be made available to the user VM provisioned at step 602, and the provisioning request of step 606 may be generated in response, for example, as part of an application appliance provisioning workflow.
- the provisioning request may further specify a set of optional features to activate during provisioning.
- the provisioning request may further specify a set of optional implementation resources 218 ( Figure 2) and/or resource capacities to be made available to the provisioned application appliance.
- the application appliance may be provisioned.
- the provisioning component 408 may provision the requested application appliance 320 ( Figure 3) in the application vendor space 308 in accordance with the provisioning request of step 606.
- a communication connection between the user VM and the application appliance may be provisioned.
- the provisioning component 408 ( Figure 4) may provision the communication connection 322 ( Figure 3) with suitable implementation resources 218 ( Figure 2).
- an application appliance access policy set may be configured.
- the application rights management component 414 may configure the policy enforcement component 410 with one or more policies governing the provisioned application appliance 320, the provisioned user VM 314 and/or the communication connection 322 between them.
- the application rights management component 414 may provide one or more templates for such policies that are configured by the application appliance provisioning workflow.
- access to the provisioned application appliance in accordance with the access policy set configured at step 612 may be enabled.
- the policy enforcement component 410 may begin enforcing the access policy set of step 612, the communication connection 322 ( Figure 3) may be activated and/or a local interface corresponding to the interface 332 of the application appliance 320 may be made available to processes maintained by the virtual machine 314.
- Figure 7 depicts example steps for dynamic feature activation in accordance with at least one embodiment.
- a provisioned application appliance instance may subscribe to feature activation requests.
- the application rights management component 414 may subscribe the application appliance 320 ( Figure 3) to such requests.
- a feature activation request may be received.
- an authorized user associated with a tenant of the virtual resource provider 206 Figure 2 may request that an optional set of computing application functionality implemented by the application appliance 320 be made available to the user VM 314.
- the feature activation request may be made through the user interface 404 ( Figure 4) and received and processed by the application rights management component 414 and/or the workflow component 416.
- the application appliance instance may be notified of the feature activation request received at step 704.
- the application rights management component 414 may notify the application appliance 320 ( Figure 3) of the feature activation request through a suitable interface element of the application appliance 320.
- a response to the notification of step 706 may be received.
- the application instance 320 may respond that the requested feature has been activated and/or is available, or else that there was a problem processing the feature activation request.
- step 710 it may be determined whether the requested feature was activated, for example, in accordance with the response received at step 708. If the requested feature was activated, a process incorporating step 710 may progress to step 714. Otherwise, the process may progress to step 712.
- the sender of the request received at step 704 may be notified of the problem that occurred during processing of the feature activation request.
- the cost tracking component 412 ( Figure 4) may be notified of the successful activation of the requested feature, for example, by the application rights management component 414.
- an account associated with the application appliance instance may be updated. For example, the cost tracking component 412 may update a tenant account associated with the user VM 314 to begin accounting for the activated feature in accordance with a corresponding cost plan.
- the control plane 402 may be facilitated by one or more workflows maintained by the workflow component 416.
- Figure 8 depicts example steps for workflow management in accordance with at least one embodiment.
- a request may be received by an interface of the control plane 402 ( Figure 4).
- the user interface 404 or the application vendor interface 406 of the control plane 402 may receive the request from a user and/or administrator of the virtual resource provider 202.
- the request may be analyzed to determine one or more actions required to successfully process the request.
- the provisioning component 408 may analyze the request, and determine a set of actions required to provision a set of computing resources 212 ( Figure 2).
- the interface may extract information from the request to be utilized in determining aspects and/or parameters of the action to be performed.
- a request may be sent to create a workflow based at least in part on the one or more actions determined at step 804.
- provisioning component 408 ( Figure 4) may send the request to the workflow component 416.
- the request to create the workflow may include the action(s), action metadata such as type of action, and/or action parameters.
- the control plane 402 and/or the workflow component 416 maintains a job queue for such requests, and workflows are created responsive to new additions to the job queue.
- a workflow and one or more component tasks may be created.
- the workflow component 416 may analyze the request of step 806 to determine the appropriate workflow and component tasks to create.
- execution of the component task(s) may be guided in accordance with the workflow.
- the workflow component 416 ( Figure 4) may activate elements of interfaces of various implementation resources to provision the set of virtual resources.
- the workflow component 416 may manage bids for execution of the component task(s) by components of the virtual resource provider 206 ( Figure 2).
- it may be determined whether the workflow has finished. For example, the workflow component 416 may determine whether a final task in a sequence of tasks managed by the workflow has completed. If so, a procedure incorporating step 812 may progress to step 814. Otherwise the procedure may return to step 810 for a next task and/or task sequence. Workflows may guide multiple task sequences executing in parallel.
- a computer-implemented method for managing rights to computing application functionality comprising: under control of one or more computer systems configured with executable instructions, provisioning a first virtual machine that includes an operating system to which at least one user associated with a tenant of a multi-tenant virtual resource provider has access, the provisioning of the first virtual machine facilitated at least in part by a control plane of the multi-tenant virtual resource provider; provisioning a second virtual machine configured at least to execute at least a portion of an application, the provisioning of the second virtual machine facilitated at least in part by the control plane of the multi-tenant virtual resource provider; providing said at least one user access to functionality of the application at least in part by establishing at least one communication connection between the first virtual machine and the second virtual machine and maintaining at least one interface to the application at the second virtual machine; enforcing a condition of access to the functionality of the application by said at least one user, the condition of access specifying at least that the access occur through said at least one communication connection and said at least one interface, the enforcing of the
- Clause 2 A computer-implemented method according to Clause 1, wherein provisioning the first virtual machine and the second virtual machine comprises allocating implementation resources from a pool of implementation resources managed by the control plane of the multi-tenant virtual resource provider.
- Clause 3 A computer-implemented method according to Clause 2, further comprising: receiving a specification of at least one resource capacity to be available to the application; and provisioning a set of virtual resources including the second virtual machine with a set of implementation resources from the pool of implementation resources that collectively have a set of resource capacities that include said at least one specified resource capacity.
- Clause 4 A computer-implemented method according to Clause 3, wherein said at least one specified resource capacity is specified as a multiple of a pre-defmed set of implementation resources.
- a computer-implemented method for managing rights to computing application functionality comprising: under control of one or more computer systems configured with executable instructions, provisioning at least one virtual machine configured at least to execute at least a portion of an application, the provisioning performed at least in part by a virtual resource provider; providing at least one user access to functionality of the application at least in part by establishing at least one communication connection to at least one interface of the application, said at least one interface maintained at least in part by said at least one virtual machine; enforcing a condition of access to the functionality of the application, the condition of access to the functionality of the application specifying at least that the access occur through said at least one communication connection and said at least one interface, the enforcing of the condition of access to the functionality of the application performed at least in part by the virtual resource provider; and permitting data to be conveyed through said at least one communication connection for presentation to said at least one user.
- Clause 6 A computer-implemented method according to Clause 5, further comprising enforcing a condition of access to said at least one virtual machine, the condition of access to said at least one virtual machine specifying at least that the access occur through said at least one communication connection and said at least one interface, the enforcing of the condition of access to said at least one virtual machine performed at least in part by a control plane of the virtual resource provider.
- Clause 7 A computer-implemented method according to Clause 5, wherein said at least one virtual machine is implemented with a set of implementation resources and access to functionality of the set of implementation resources is controlled by a control plane of the virtual resource provider.
- Clause 8 A computer-implemented method according to Clause 7, wherein the set of implementation resources includes at least one of: a volatile storage device, a non-volatile storage device, a processor, a physical server, a network interface port, a network switch, and a network path.
- Clause 9 A computer-implemented method according to Clause 5, wherein said at least one communication connection is implemented with a set of implementation resources and access to functionality of the set of implementation resources is controlled by a control plane of the virtual resource provider.
- Clause 10 A computer-implemented method according to Clause 5, wherein providing said at least one user access to functionality of the application comprises creating at least one policy specifying the condition of access and enforcing the condition of access comprises enforcing said at least one policy with a policy enforcement component of the virtual resource provider.
- Clause 11 A computer-implemented method according to Clause 5, wherein said at least one interface comprises a plurality of interface elements corresponding to a plurality of functional features of the application and the condition of access to the functionality of the application further specifies that the access corresponds to a selected subset of the plurality of interface elements.
- Clause 12 A computer-implemented method according to Clause 5, wherein provisioning said at least one virtual machine has an associated set of costs that are charged to an account associated with said at least one user.
- Clause 13 A computer- implemented method according to Clause 12, wherein the set of application costs includes at least one cost corresponding to at least one application feature that is capable of being activated and deactivated.
- Clause 14 A computer-implemented method according to Clause 5, further comprising: receiving, at a control plane of the virtual resource provider, a user request to activate at least one feature of the application from said at least one user; submitting a control plane request to activate said at least one feature to a feature configuration interface of the application, the feature configuration interface maintained at least in part by said at least one virtual machine and inaccessible to said at least one user through said at least one communication connection; receiving, at the control plane, confirmation that said at least one feature has been activated; and notifying a cost tracking component of the control plane that costs associated with said at least one activated feature are to be charged to an account associated with said at least one user.
- Clause 15 A computer-implemented method according to Clause 5, wherein provisioning said at least one virtual machine has an associated set of implementation resource costs that are charged to an account associated with said at least one user.
- Clause 16 A computer-implemented method according to Clause 5, further comprising receiving a user request to provision said at least one virtual machine, the user request specifying, at least in part, at least one capacity of at least one implementation resource to be made available to said at least one virtual machine.
- a computer-implemented method for managing rights to computing application functionality comprising: under control of one or more computer systems configured with executable instructions, providing at least one user access to functionality of an application at least in part by establishing at least one communication connection to at least one interface of the application, said at least one interface maintained at least in part by at least one virtual machine provisioned at a virtual resource provider; enforcing a condition of access to the functionality of the application, the condition of access to the functionality of the application specifying at least that the access occur through said at least one communication connection and said at least one interface, the enforcing of the condition of access to the functionality of the application performed at least in part by a control plane of the virtual resource provider; tracking at least one cost associated with accessing the functionality of the application through said at least one communication connection and said at least one interface; and providing tracked cost data for presentation to a tenant of the virtual resource provider.
- Clause 18 A computer-implemented method according to Clause 17, wherein the functionality of the application is implemented at least in part by at least one implementation resource of the virtual resource provider and tracking said at least one cost comprises tracking a number of time units during which said at least one implementation resource participates in implementing the functionality.
- Clause 19 A computer- implemented method according to Clause 17, wherein tracking said at least one cost comprises tracking a number of utilizations of at least one interface element of said at least one interface of the application.
- a computerized system for managing rights to computing application functionality comprising: a set of implementation resources configurable at least to implement a plurality of virtual resources; a virtual resource provisioning component configured at least to provision virtual resources with the set of implementation resources responsive to provisioning requests, the virtual resources including at least one virtual machine configured at least to execute at least a portion of an application and at least one communication connection to at least one interface of the application; and a policy enforcement component configured at least to enforce a condition of access to functionality of the application, the condition of access to the functionality of the application specifying at least that the access occur through said at least one communication connection and said at least one interface.
- Clause 21 A computerized system according to Clause 20, wherein the computerized system further comprises a user interface component configured at least to enable a user to submit a request to access the functionality of the application and said at least one virtual machine is provisioned by the virtual resource provisioning component at least partly in response to the request to access the functionality of the application.
- a user interface component configured at least to enable a user to submit a request to access the functionality of the application and said at least one virtual machine is provisioned by the virtual resource provisioning component at least partly in response to the request to access the functionality of the application.
- Clause 22 A computerized system according to Clause 20, wherein the computerized system further comprises a vendor interface component configured at least to enable an application vendor to configure said at least one virtual machine to execute said at least a portion of the application and to configure at least one cost associated with accessing the functionality of the application.
- a vendor interface component configured at least to enable an application vendor to configure said at least one virtual machine to execute said at least a portion of the application and to configure at least one cost associated with accessing the functionality of the application.
- One or more computer-readable media having collectively thereon computer- executable instructions that configure one or more computers to collectively, at least: provision at least one virtual machine configured at least to execute at least a portion of an application, the provisioning facilitated at least in part by a control plane of a virtual resource provider; provide at least one user access to functionality of the application at least in part by establishing at least one communication connection to at least one interface of the application, said at least one interface maintained at least in part by said at least one virtual machine; enforce a condition of access to the functionality of the application, the condition of access to the functionality of the application specifying at least that the access occur through said at least one communication connection and said at least one interface, the enforcing of the condition of access to the functionality of the application performed at least in part by the control plane of the virtual resource provider; and permit data to be conveyed through said at least one communication connection for presentation to said at least one user.
- Clause 24 One or more computer-readable media according to Clause 23, wherein said at least one interface is maintained at a communication network location that is remote with respect to an operating system of said at least one user and access to said at least one communication connection is through at least one corresponding interface that is local to the operating system.
- Clause 25 One or more computer-readable media according to Clause 23, wherein said at least one interface comprises an interface in accordance with a remote desktop protocol.
- the various embodiments described herein may be implemented in a wide variety of operating environments, which in some cases may include one or more user computers, computing devices, or processing devices which may be utilized to operate any of a number of applications.
- User or client devices may include any of a number of general purpose personal computers, such as desktop or laptop computers running a standard operating system, as well as cellular, wireless, and handheld devices running mobile software and capable of supporting a number of networking and messaging protocols.
- Such a system also may include a number of workstations running any of a variety of commercially-available operating systems and other known applications for purposes such as development and database management.
- These devices also may include other electronic devices, such as dummy terminals, thin-clients, gaming systems, and other devices capable of communicating via a network.
- Most embodiments utilize at least one network that would be familiar to those skilled in the art for supporting communications using any of a variety of commercially- available protocols, such as TCP/IP, OSI, FTP, UPnP, NFS, CIFS, and AppleTalk.
- a network may include, for example, a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network, and any combination thereof.
- the network may, furthermore, incorporate any suitable network topology. Examples of suitable network topologies include, but are not limited to, simple point-to-point, star topology, self organizing peer-to-peer topologies, and combinations thereof.
- the Web server may run any of a variety of server or mid-tier applications, including HTTP servers, FTP servers, CGI servers, data servers, Java servers, and business application servers.
- the server(s) also may be capable of executing programs or scripts in response requests from user devices, such as by executing one or more Web applications that may be implemented as one or more scripts or programs written in any programming language, such as Java ® , C, C# or C++, or any scripting language, such as Perl, Python, or TCL, as well as combinations thereof.
- the server(s) may also include database servers, including without limitation those commercially available from Oracle ® , Microsoft ® , Sybase ® , and IBM ® .
- the environment may include a variety of data stores and other memory and storage media as discussed above. These may reside in a variety of locations, such as on a storage medium local to (and/or resident in) one or more of the computers or remote from any or all of the computers across the network. In a particular set of embodiments, the information may reside in a storage-area network ("SAN") familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to the computers, servers, or other network devices may be stored locally and/or remotely, as appropriate.
- SAN storage-area network
- each such device may include hardware elements that may be electrically coupled via a bus, the elements including, for example, at least one central processing unit (CPU), at least one input device (e.g., a mouse, keyboard, controller, touch screen, or keypad), and at least one output device (e.g., a display device, printer, or speaker).
- CPU central processing unit
- input device e.g., a mouse, keyboard, controller, touch screen, or keypad
- at least one output device e.g., a display device, printer, or speaker
- Such a system may also include one or more storage devices, such as disk drives, optical storage devices, and solid-state storage devices such as random access memory (“RAM”) or read-only memory (“ROM”), as well as removable media devices, memory cards, flash cards, etc.
- ROM read-only memory
- Such devices may include a computer-readable storage media reader, a communications device (e.g., a modem, a network card (wireless or wired), an infrared communication device, etc.), and working memory as described above.
- the computer- readable storage media reader may be connected with, or configured to receive, a computer- readable storage medium, representing remote, local, fixed, and/or removable storage devices as well as storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information.
- the system and various devices also typically will include a number of software applications, modules including program modules, services, or other elements located within at least one working memory device, including an operating system and application programs, such as a client application or Web browser.
- Storage media and computer readable media for containing code, or portions of code may include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be utilized to store the desired information and which may be accessed by the a system device.
- storage media and communication media such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical
- Program modules, program components and/or programmatic objects may include computer-readable and/or computer-executable instructions of and/or corresponding to any suitable computer programming language.
- each computer-readable medium may be tangible.
- each computer-readable medium may be non-transitory in time.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2012230866A AU2012230866B2 (en) | 2011-03-22 | 2012-03-22 | Strong rights management for computing application functionality |
EP12761329.7A EP2689324B1 (en) | 2011-03-22 | 2012-03-22 | Strong rights management for computing application functionality |
SG2013054788A SG192018A1 (en) | 2011-03-22 | 2012-03-22 | Strong rights management for computing application functionality |
BR112013021996-3A BR112013021996B1 (en) | 2011-03-22 | 2012-03-22 | computer-implemented method and system for managing computer application functionality rights |
JP2013557949A JP5702477B2 (en) | 2011-03-22 | 2012-03-22 | Powerful rights management for computing application functions |
CA2825153A CA2825153C (en) | 2011-03-22 | 2012-03-22 | Strong rights management for computing application functionality |
CN201280014130.XA CN103703443B (en) | 2011-03-22 | 2012-03-22 | Powerful rights management for calculating function of application |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/069,271 | 2011-03-22 | ||
US13/069,271 US20120246740A1 (en) | 2011-03-22 | 2011-03-22 | Strong rights management for computing application functionality |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012129409A2 true WO2012129409A2 (en) | 2012-09-27 |
WO2012129409A3 WO2012129409A3 (en) | 2013-09-26 |
Family
ID=46878472
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/030130 WO2012129409A2 (en) | 2011-03-22 | 2012-03-22 | Strong rights management for computing application functionality |
Country Status (9)
Country | Link |
---|---|
US (1) | US20120246740A1 (en) |
EP (1) | EP2689324B1 (en) |
JP (1) | JP5702477B2 (en) |
CN (1) | CN103703443B (en) |
AU (1) | AU2012230866B2 (en) |
BR (1) | BR112013021996B1 (en) |
CA (1) | CA2825153C (en) |
SG (1) | SG192018A1 (en) |
WO (1) | WO2012129409A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028513A1 (en) * | 2015-08-19 | 2017-02-23 | 华为技术有限公司 | Method and apparatus for deploying security access control strategy |
JP2020532251A (en) * | 2017-08-25 | 2020-11-05 | レフト テクノロジーズ インコーポレイテッド | Mesh communication network with mesh ports |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9489647B2 (en) | 2008-06-19 | 2016-11-08 | Csc Agility Platform, Inc. | System and method for a cloud computing abstraction with self-service portal for publishing resources |
US10841839B2 (en) * | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US8756488B2 (en) * | 2010-06-18 | 2014-06-17 | Sweetlabs, Inc. | Systems and methods for integration of an application runtime environment into a user computing environment |
US9003141B2 (en) * | 2011-11-14 | 2015-04-07 | Ca, Inc. | Enhanced software application platform |
US9720668B2 (en) | 2012-02-29 | 2017-08-01 | Red Hat, Inc. | Creating and maintaining multi-tenant applications in a platform-as-a-service (PaaS) environment of a cloud computing system |
US9058198B2 (en) * | 2012-02-29 | 2015-06-16 | Red Hat Inc. | System resource sharing in a multi-tenant platform-as-a-service environment in a cloud computing system |
US8850514B2 (en) | 2012-05-01 | 2014-09-30 | Red Hat, Inc. | Cartridges in a multi-tenant platforms-as-a-service (PaaS) system implemented in a cloud computing environment |
US9665411B2 (en) | 2012-05-01 | 2017-05-30 | Red Hat, Inc. | Communication between a server orchestration system and a messaging system |
US8775925B2 (en) | 2012-08-28 | 2014-07-08 | Sweetlabs, Inc. | Systems and methods for hosted applications |
US9323939B2 (en) * | 2012-12-17 | 2016-04-26 | Ca, Inc. | Multi-tenancy governance in a cloud computing environment |
US9535734B2 (en) | 2014-03-06 | 2017-01-03 | International Business Machines Corporation | Managing stream components based on virtual machine performance adjustments |
US9262200B2 (en) | 2014-06-25 | 2016-02-16 | Independenceit, Inc. | Methods and systems for provisioning a virtual resource in a mixed-use server |
CN106660204A (en) * | 2014-08-28 | 2017-05-10 | Abb瑞士股份有限公司 | A device, system and method for setting an operation of a robot unit, and use of a device |
WO2016065565A1 (en) * | 2014-10-30 | 2016-05-06 | Empire Technology Development Llc | Malicious virtual machine alert generator |
CN104601555A (en) * | 2014-12-30 | 2015-05-06 | 中国航天科工集团第二研究院七〇六所 | Trusted security control method of virtual cloud terminal |
CN106452814B (en) | 2015-08-10 | 2019-11-26 | 阿里巴巴集团控股有限公司 | A kind of method and apparatus using external account operating resource |
US9674108B1 (en) | 2015-12-30 | 2017-06-06 | Accenture Global Solutions Limited | Hub-and-spoke connection architecture |
US10212169B2 (en) * | 2016-03-30 | 2019-02-19 | Oracle International Corporation | Enforcing data security in a cleanroom data processing environment |
CN109643242B (en) * | 2016-05-23 | 2023-06-27 | 摩根大通国家银行 | Security design and architecture for multi-tenant HADOOP clusters |
US11102702B2 (en) | 2016-05-30 | 2021-08-24 | Intermesh Holdings Inc. | Method for establishing network clusters between networked devices |
WO2018183312A1 (en) | 2017-03-28 | 2018-10-04 | Cloudjumper Corporation | Methods and systems for providing wake-on-demand access to session servers |
US10523677B2 (en) * | 2017-04-28 | 2019-12-31 | Versata Development Group, Inc. | Managing metadata for external content within a computing environment |
US10749698B2 (en) * | 2017-05-18 | 2020-08-18 | Vmware, Inc. | Feature-aware software usage metering |
CN109688086A (en) * | 2017-10-19 | 2019-04-26 | 北京京东尚科信息技术有限公司 | Authority control method and device for terminal device |
CN113748685A (en) * | 2019-03-21 | 2021-12-03 | 诺基亚技术有限公司 | Network-based media processing control |
JP6738466B1 (en) * | 2019-06-28 | 2020-08-12 | Dmg森精機株式会社 | Information processing apparatus, information processing method, and information processing program |
CN113836500B (en) * | 2020-06-23 | 2023-11-07 | 上海森亿医疗科技有限公司 | Data authority control method, system, terminal and storage medium |
CN112084488A (en) * | 2020-08-27 | 2020-12-15 | 广州新视展投资咨询有限公司 | Application authority management method, device and system |
US20220283867A1 (en) * | 2021-03-05 | 2022-09-08 | Netflix, Inc. | Management of a scalable pool of workstation instances |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110022812A1 (en) | 2009-05-01 | 2011-01-27 | Van Der Linden Rob | Systems and methods for establishing a cloud bridge between virtual storage resources |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7725559B2 (en) * | 2003-10-08 | 2010-05-25 | Unisys Corporation | Virtual data center that allocates and manages system resources across multiple nodes |
GB0422750D0 (en) * | 2004-10-13 | 2004-11-17 | Ciphergrid Ltd | Remote database technique |
US8972449B2 (en) * | 2005-12-29 | 2015-03-03 | Nextlabs, Inc. | Preventing conflicts of interests between two or more groups |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US7873805B2 (en) * | 2007-02-23 | 2011-01-18 | Lewis, Rice & Fingersh, L.C. | Data recovery systems and methods |
JP2008234200A (en) * | 2007-03-19 | 2008-10-02 | Nec Corp | Security management system, security management method, security management program |
US8875266B2 (en) * | 2007-05-16 | 2014-10-28 | Vmware, Inc. | System and methods for enforcing software license compliance with virtual machines |
JP4874908B2 (en) * | 2007-09-20 | 2012-02-15 | 株式会社東芝 | Information processing system and monitoring method |
JP5104588B2 (en) * | 2007-10-18 | 2012-12-19 | 富士通株式会社 | Migration program and virtual machine management device |
JP4627789B2 (en) * | 2007-11-26 | 2011-02-09 | 株式会社リコー | Information processing apparatus, information processing method, and program |
WO2009085977A2 (en) * | 2007-12-20 | 2009-07-09 | Virtual Computer, Inc. | Virtual computing management systems and methods |
JP2009258982A (en) * | 2008-04-16 | 2009-11-05 | Ntt Docomo Inc | Node device, program, and resource-allocating method |
CN101309180B (en) * | 2008-06-21 | 2010-12-08 | 华中科技大学 | Security network invasion detection system suitable for virtual machine environment |
KR101331032B1 (en) * | 2008-07-30 | 2013-11-19 | 삼성전자주식회사 | Method for executing application associated with virtualized environment |
US8434093B2 (en) * | 2008-08-07 | 2013-04-30 | Code Systems Corporation | Method and system for virtualization of software applications |
US20100241731A1 (en) * | 2009-03-17 | 2010-09-23 | Gladinet, Inc. | Method for virtualizing internet resources as a virtual computer |
US8370510B2 (en) * | 2009-12-18 | 2013-02-05 | Microsoft Corporation | Remote application presentation over a public network connection |
EP2583211B1 (en) * | 2010-06-15 | 2020-04-15 | Oracle International Corporation | Virtual computing infrastructure |
US8713088B2 (en) * | 2011-03-27 | 2014-04-29 | Hewlett-Packard Development Company, L.P. | Identifying users of remote sessions |
-
2011
- 2011-03-22 US US13/069,271 patent/US20120246740A1/en not_active Abandoned
-
2012
- 2012-03-22 JP JP2013557949A patent/JP5702477B2/en active Active
- 2012-03-22 EP EP12761329.7A patent/EP2689324B1/en active Active
- 2012-03-22 WO PCT/US2012/030130 patent/WO2012129409A2/en unknown
- 2012-03-22 CA CA2825153A patent/CA2825153C/en active Active
- 2012-03-22 CN CN201280014130.XA patent/CN103703443B/en active Active
- 2012-03-22 BR BR112013021996-3A patent/BR112013021996B1/en active IP Right Grant
- 2012-03-22 SG SG2013054788A patent/SG192018A1/en unknown
- 2012-03-22 AU AU2012230866A patent/AU2012230866B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110022812A1 (en) | 2009-05-01 | 2011-01-27 | Van Der Linden Rob | Systems and methods for establishing a cloud bridge between virtual storage resources |
Non-Patent Citations (2)
Title |
---|
DIRK KUHLMANN ET AL., AN OPEN TRUSTED COMPUTING ARCHITECTURE - SECURE VIRTUAL MACHINES ENABLING USER-DEFINED POLICY ENFORCEMENT, 28 June 2006 (2006-06-28) |
See also references of EP2689324A4 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028513A1 (en) * | 2015-08-19 | 2017-02-23 | 华为技术有限公司 | Method and apparatus for deploying security access control strategy |
US11570148B2 (en) | 2015-08-19 | 2023-01-31 | Huawei Cloud Computing Technologies Co., Ltd. | Method and apparatus for deploying security access control policy |
JP2020532251A (en) * | 2017-08-25 | 2020-11-05 | レフト テクノロジーズ インコーポレイテッド | Mesh communication network with mesh ports |
Also Published As
Publication number | Publication date |
---|---|
EP2689324A4 (en) | 2015-03-11 |
BR112013021996B1 (en) | 2021-05-18 |
US20120246740A1 (en) | 2012-09-27 |
EP2689324A2 (en) | 2014-01-29 |
CN103703443B (en) | 2017-10-10 |
CA2825153A1 (en) | 2012-09-27 |
AU2012230866B2 (en) | 2015-06-11 |
JP5702477B2 (en) | 2015-04-15 |
JP2014507741A (en) | 2014-03-27 |
CN103703443A (en) | 2014-04-02 |
CA2825153C (en) | 2017-08-22 |
BR112013021996A2 (en) | 2016-12-06 |
WO2012129409A3 (en) | 2013-09-26 |
AU2012230866A1 (en) | 2013-08-15 |
EP2689324B1 (en) | 2018-08-29 |
SG192018A1 (en) | 2013-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2825153C (en) | Strong rights management for computing application functionality | |
US10033604B2 (en) | Providing compliance/monitoring service based on content of a service controller | |
CN107408064B (en) | Method for executing commands in virtual machine instances and system for implementing the method | |
US8122282B2 (en) | Starting virtual instances within a cloud computing environment | |
US12132764B2 (en) | Dynamic security policy management | |
US9129086B2 (en) | Providing security services within a cloud computing environment | |
US9866547B2 (en) | Controlling a discovery component, within a virtual environment, that sends authenticated data to a discovery engine outside the virtual environment | |
US10891386B2 (en) | Dynamically provisioning virtual machines | |
US10542048B2 (en) | Security compliance framework usage | |
US9160754B2 (en) | Location based authentication of users to a virtual machine in a computer system | |
US9563419B2 (en) | Managing deployment of application pattern based applications on runtime platforms | |
US9843605B1 (en) | Security compliance framework deployment | |
US8214499B2 (en) | System and method for enabling software applications as a service in a non-intrusive manner |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12761329 Country of ref document: EP Kind code of ref document: A2 |
|
ENP | Entry into the national phase |
Ref document number: 2825153 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2012230866 Country of ref document: AU Date of ref document: 20120322 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2013557949 Country of ref document: JP Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112013021996 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112013021996 Country of ref document: BR Kind code of ref document: A2 Effective date: 20130828 |